国产一级a片免费看高清,亚洲熟女中文字幕在线视频,黄三级高清在线播放,免费黄色视频在线看

打開APP
userphoto
未登錄

開通VIP,暢享免費(fèi)電子書等14項(xiàng)超值服

開通VIP
Middlebox Communication (midcom) Charter

Middlebox Communication (midcom)

Last Modified: 2006-03-24

Chair(s):

  • Melinda Shore <mshore@cisco.com>

    Transport Area Director(s):

  • Magnus Westerlund <magnus.westerlund@ericsson.com>
  • Lars Eggert <lars.eggert@netlab.nec.de>

    Transport Area Advisor:

  • Magnus Westerlund <magnus.westerlund@ericsson.com>

    Mailing Lists:

    General Discussion: midcom@ietf.org
    To Subscribe: midcom-request@ietf.org
    In Body: subscribe your_email_address
    Archive: http://www.ietf.org/mail-archive/web/midcom/index.html

    Description of Working Group:

    As trusted third parties are increasingly being asked to make policy
    decisions on behalf of the various entities participating in an
    application‘s operation, a need has developed for applications to be
    able to communicate their needs to the devices in the network that
    provide transport policy enforcement. Examples of these devices
    include firewalls, network address translators (both within and
    between
    address families), signature management for intrusion detection
    systems, and multimedia buffer management. These devices are a subset
    of what can be referred to as ‘middleboxes.‘

    This working group will focus its attention on communication with
    firewalls and network address translators (including translation
    between IPv6 and IPv4). Work will not preclude extensibility to other
    categories of middle box.

    Decomposing applications requiring policy decisions by removing
    application logic from the middle box and instead providing a
    generalized communications interface provides a number of benefits,
    including improved performance, lower software development and
    maintenance costs, improved ability to support traversal of packet
    filters by complex protocols, easier deployment of new applications,
    and the ability to consolidate management functions. For example, by
    moving stateful inspection of protocols such as H.323 and SIP out
    of firewalls, it is possible to improve performance and scalability
    and
    reduce development and costs.

    This working group will concern itself with an environment that
    consists of:

    - one or more middle boxes in the data path

    - an external requesting entity

    - a policy entity for consultation purposes when the
        requesting entity is untrusted.

    The requesting entity may be trusted or untrusted. In the case where
    it
    is trusted, the middle box will treat the request from the entity as
    authoritative. In the case where it is not trusted, the intermediate
    device will have to verify that it is authorized to complete the
    request. That authorization could come from a separate or a built in
    policy server.

    The primary focus of the working group will be the application of this
    architecture to communicating requests between applications and
    firewalls or NATs. This will not preclude other uses, and care will be
    taken to ensure that the protocol is extensible.

    The working group will evaluate existing IETF protocols for their
    applicability to this problem, using the framework and requirements
    documents developed during the working group‘s first phase as criteria
    for the evaluation. If a protocol is found to be suitable it will be
    used as the basis for the development of a middlebox communication
    protocol. In the unlikely case that one is not found to be suitable,
    the working group will undertake development of a new protocol.

    Discovery of middle boxes is out of scope.

    The deliverables will be

    o a document evaluating existing IETF protocols for their
        suitability

    o a document specifying a middlebox communication protocol
        or profile based on the results of the protocol evaluation.

    This working group will only deal with firewalls and network
    address translators.

    Ubiquitous deployment of midcom in all middleboxes could take many
    years. In the interim, a solution is needed that allows applications
    to
    operate in the presence of midcom-unaware middleboxes. To support
    this,
    the midcom group will develop or document a protocol or approach that
    allows clients to indirectly obtain address bindings from midcom-
    unaware middleboxes, through communications with server elements on
    the
    public side of the middlebox. The key goals for this effort are rapid
    delivery of a simple solution (since it is an interim solution),
    consistency with the midcom framework, and security. In particular,
    any
    proposed interim approaches will address (and document) the
    architectural and pragmatic concerns described in [UNSAF].

    Goals and Milestones:

    Done    submit Internet-Drafts of framework, architecture and interfaces documents to IESG for publication as Informational RFCs
    Done    Submission of STUN document for standards-track publication
    Done    Submission of pre-midcom document describing protocol for NAT traversal using relay for standards-track publication
    Done    Submission of document evaluating existing IETF protocols against midcom framework and requirements for an Informational RFC.
    Done    An analysis of the existing mibs and initial list of mibs (or portions of mibs) that need to be developed submitted to WG
    Done    Semantics document submitted to IESG for publication as informational RFC
    Done    Initial mibs ID submitted
    Jun 2004    Mib documents submitted to IESG

    Internet-Drafts:

    Definitions of Managed Objects for Middlebox Communication (193394 bytes)

    Request For Comments:

    Middlebox Communications (MIDCOM) Protocol Requirements (RFC 3304) (16187 bytes)
    Middlebox Communication Architecture and framework (RFC 3303) (91209 bytes)
    STUN - Simple Traversal of UDP Through Network Address Translators (RFC 3489) (117562 bytes)
    MIDCOM Protocol Semantics (RFC 3989) (160606 bytes)
    Middlebox Communications (MIDCOM) Protocol Evaluation (RFC 4097) (99303 bytes)

    IETF Secretariat - Please send questions, comments, and/or suggestions to ietf-web@ietf.org.

    Return to working group directory.

    Return to IETF home page.

  • 本站僅提供存儲服務(wù),所有內(nèi)容均由用戶發(fā)布,如發(fā)現(xiàn)有害或侵權(quán)內(nèi)容,請點(diǎn)擊舉報(bào)
    打開APP,閱讀全文并永久保存 查看更多類似文章
    猜你喜歡
    類似文章
    VoIP穿越NAT和防火墻的方法
    網(wǎng)易博客歡迎您-Sacrifice
    InfoQ: 對Entity Framework應(yīng)用二級緩存
    【開篇導(dǎo)航】
    .NET Entity Framework入門簡介及簡單操作
    關(guān)于泰山眾籌系統(tǒng)開發(fā)模式分析及邏輯策略方案講解
    更多類似文章 >>
    生活服務(wù)
    分享 收藏 導(dǎo)長圖 關(guān)注 下載文章
    綁定賬號成功
    后續(xù)可登錄賬號暢享VIP特權(quán)!
    如果VIP功能使用有故障,
    可點(diǎn)擊這里聯(lián)系客服!

    聯(lián)系客服